nickvourd / random_c2_profileLinks
Cobalt Strike random C2 Profile generator
☆11Updated 3 months ago
Alternatives and similar repositories for random_c2_profile
Users that are interested in random_c2_profile are comparing it to the libraries listed below
Sorting:
- Encode shellcode into dictionary words for evasion and entropy reduction☆26Updated 7 months ago
- Copy metadata and digital signatures information from one Windows executable to another using Wine on a non-Windows platform☆17Updated last year
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆40Updated 9 months ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆24Updated 9 months ago
- ☆55Updated 8 months ago
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆30Updated 4 months ago
- Sniffing files generator☆58Updated 4 months ago
- Tool to bypass LSA Protection (aka Protected Process Light)☆54Updated 5 months ago
- Cortex EDR Ransomware protection Bypass☆24Updated 4 months ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆52Updated 2 months ago
- Cobalt Strike UDRL for memory scanner evasion.☆52Updated last year
- ☆107Updated 4 months ago
- EmbedExeLnk by x86matthew modified by d4rkiZ☆42Updated 2 years ago
- SAM Dumping in C#☆48Updated 5 months ago
- A care package of useful bofs for red team engagments☆55Updated 6 months ago
- a C# implementation for a shellcode loader that capable to bypass Cortex XDR and Sophos EDR.☆52Updated last month
- Tool to aid in dumping LSASS process remotely☆40Updated 10 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆47Updated last month
- Modified versions of the Cobalt Strike Process Injection Kit☆95Updated last year
- ☆97Updated 9 months ago
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆43Updated last month
- Beacon Object Files (not Buffer Overflows)☆56Updated 2 years ago
- Click Once + App Domain☆62Updated last year
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆70Updated last year
- Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion☆84Updated 2 months ago
- Lateral Movement via the .NET Profiler☆82Updated 7 months ago
- ☆50Updated 3 weeks ago
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆84Updated 2 years ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆82Updated 8 months ago
- Windows Thread Pool Injection Havoc Implementation☆30Updated last year